CVE-2021-39191

CWE-601Open Redirect6 documents6 sources
Severity
6.1MEDIUM
EPSS
0.3%
top 43.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 3
Latest updateSep 14

Description

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applie

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

Debianlibapache2-mod-auth-openidc< 2.4.9.4-0+deb11u1+3
CVEListV5zmartzone/mod_auth_openidc<=2.4.9.3

Also affects: Debian Linux 10.0, Fedora 35, 36

Patches

🔴Vulnerability Details

2
CVEList
URL Redirection to Untrusted Site ('Open Redirect') in mod_auth_openidc2021-09-03
OSV
CVE-2021-39191: mod_auth_openidc is an authentication/authorization module for the Apache 22021-09-03

📋Vendor Advisories

3
Microsoft
URL Redirection to Untrusted Site ('Open Redirect') in mod_auth_openidc2021-09-14
Red Hat
mod_auth_openidc: open redirect due to target_link_uri parameter not validated2021-09-03
Debian
CVE-2021-39191: libapache2-mod-auth-openidc - mod_auth_openidc is an authentication/authorization module for the Apache 2.x HT...2021